Sie sind auf Seite 1von 1

 Home  NE   Linux   Programming   Languages  About US 

 ITE 7  CCNA1 CCNA2  CyberOps  CCNA Security

ITN Chapter 2 Quiz Answers Cisco 2019 100% Categories

Posted on December 28, 2018 by Admin CCNA CyberOps 1.1 (35)


CCNA CyberOps 1.1 – Assignments
Last Updated on December 29, 2018 by Admin
Answers (35)
CCNA Routing and Switching Essentials
ITN Chapter 2 Quiz Answers Cisco 2019 100%
v6.0 (53)
This quiz covers the content in CCNA R&S Introduction to Networks Chapter 2. It is designed to provide an additional opportunity to practice RSE Assignments Answers (33)
the skills and knowledge presented in the chapter and to prepare for the Chapter Exam. RSE Quizzes Answers (20)
CCNA Security 2.01 (31)
1. When a hostname is configured through the Cisco CLI, which three naming conventions are part of
CCNA Security – Assignments – Answers
the guidelines? (Choose three.)
(31)
the hostname should be fewer than 64 characters in length CLA – Programming Essentials in C (20)
the hostname should be written in all lower case characters CLA – Assignment Quizzes – Answers
the hostname should contain no spaces (20)
the hostname should end with a special character CPA Programming Essentials in C++ (21)
the hostname should begin with a letter CPA Assignment Quizzes (20)
Explanation: Cybersecurity Essentials 1.1 Exam-
Answers-Quizzes (44)
A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A
CyberEss v1 Packet Tracer Activity
hostname should start with a letter and no space is allowed for a hostname.
Source Files Answers (11)
CyberEss v1 Student Lab Source Files
2. Why would a technician enter the command copy startup-config running-config?
Answers (12)
to remove all configurations from the switch Introduction to Cybersecurity 2.1 (7)
to save an active configuration to NVRAM Cybersecurity Student Lab Source
to copy an existing configuration into RAM Answers (6)
to make a changed configuration the new startup configuration Introduction to Networks v6.0 (148)
Explanation: Introduction to Networks v6.0-Pilot-Exam
Beta (25)
Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to
ITN Assignments Answers (6)
copy a previously saved configuration from NVRAM into RAM in order to make changes to it.?
ITN Practice Quizzes (24)
ITN v6 Student Lab Source Files Answers
3. Which two statements are true regarding the user EXEC mode? (Choose two.)
(66)
All router commands are available. IT Essentials v6.0 (175)
Global configuration mode can be accessed by entering the enable command. ITE v6 – Assignments Answers (1)
The device prompt for this mode ends with the “>” symbol. ITE v6 Student Lab Source Files Answers
Interfaces and routing protocols can be configured. (99)
Only some aspects of the router configuration can be viewed. ITE v6 Student Packet Tracer Source
Explanation: Files Answers (5)
ITE v7.0 – IT Essentials 7.0 (84)
User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when
ITE v7 Student Lab Source Files Answers
configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the
(30)
“>” symbol.
ITE v7.0 – Assignment Answers (54)
Linux Essentials (19)
4. Whatcommand will prevent all unencrypted passwords from displaying in plain text in a Linux Essentials – Assignment Answers
configuration file?
(19)
(config)# enable password secret Linux Essentials 2.0 (40)
(config)# enable secret Secret_Password Assignments Exam Answers – Online (40)
(config-line)# password secret NDG Linux Unhatched (3)
(config)# service password-encryption Networking Essentials 1.0 (47)
(config)# enable secret Encrypted_Password NE Assignments Answers (9)
Explanation: NetEss v1 Packet Tracer Activity Source
Files Answers (17)
To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service
NetEss v1 Student Lab Source Files
password-encryption command. This command encrypts all configured passwords in the configuration file.
Answers (21)
PCAP – Programming Essentials in Python
5. To
save time, IOS commands may be partially entered and then completed by typing which key or key (16)
combination? Assignment Quizzes Answers (16)
Tab Uncategorized (666)
Ctrl-P
Ctrl-N
Up Arrow
Right Arrow
Down Arrow
6. How is SSH different from Telnet?
SSH makes connections over the network, whereas Telnet is for out-of-band access.
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure
and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of
Telnet.
SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console
connection.
Explanation:

SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than
Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term
can be used to make both SSH and Telnet connections.

7. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
interfaces that can be protected with passwords. (Choose three.)
VTY interface
console interface
Ethernet interface
boot IOS mode
privileged EXEC mode
router configuration mode
Explanation:

Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be
restricted in both user EXEC and privileged EXEC modes.

8. Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
DNS server
DHCP server
local router
local switch
Explanation:

For hosts to reach remote networks, they must send traffic to a local router that can route the traffic to the correct destination
network. This local router is known as the default gateway and hosts must be configured with this address in order to communicate
with devices on remote networks.

9. Anadministrator has just changed the IP address of an interface on an IOS device. What else must be
done in order to apply those changes to the device?
Copy the running configuration to the startup configuration file.
Copy the information in the startup configuration file to the running configuration.
Reload the device and type yes when prompted to save the configuration.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and
the Enter key has been pressed.
Explanation:

Changes to router and switch configurations take effect as soon as the command is entered. For this reason, it is very important that
changes to live production devices are always carefully planned before being implemented. If commands are entered that render
the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime.

10. A technician configures a switch with these commands:


SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Telnet access
SVI
password encryption
physical switchport access
Explanation:

For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely
over the network.

11. AnIT technician has manually configured an IP address on a laptop for a new employee. Each time
the employee tries to connect to the LAN, the employee receives a duplicate IP address error message.
What can the company do to prevent this situation from arising again?
Configure the IP address on an SVI on the laptop.
Use a virtual private network instead of the company LAN.
Use DHCP to automatically assign addresses.
Use laptops that do not require IP addresses.
Explanation:

Assigning IP addresses automatically using DHCP will greatly eliminate the chance of a duplicate IP address error.

12. Whichtwo functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
(Choose two.)
providing an error message when a wrong command is submitted
displaying a list of all available commands within the current mode
allowing the user to complete the remainder of an abbreviated command with the TAB key
determining which option, keyword, or argument is available for the entered command
selecting the best command to accomplish a task
Explanation:

Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the
current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be
used for command completion if a partial command is entered.

13. Fill in the blank.


In order to test end-to-end connectivity, you would use the ping command.
Noted: There are 4 answers. You can use one of the following: ping, trace, traceroute, and tracert, but in our system you can use
only ping.
Explanation:

Connectivity between two end devices can be tested using the ping, tracert, or traceroute commands.

14. True or False?


Mobile devices do not require IP addresses to communicate on the Internet.
True
False
Explanation:

All devices that communicate over data networks need unique IP addresses.

15. Fill in the blank.


The component of the operating software that provides the user interface is called the shell .
Explanation:

Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request
specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware
functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.

Home NE Linux Programming Languages About US


Copyright PREMIUMEXAM © 2019

Das könnte Ihnen auch gefallen